How Can DSPM Prevent High-Profile Breaches?

In early October 2023, a DNA testing company for ancestry discovery purposes, 23andMe, disclosed that it suffered a data breach.

On the 5th of December 2023, the company shared that the data breach was more damaging than was initially reported.

At first, they claimed that the data of 14,000 users was compromised. On Tuesday, the company revealed that hackers had stolen the data of 6.9 million users.

For reference, 14 million users use their services. Bad actors obtained sensitive data from almost half the users.

Stolen information includes ancestry, family trees, names, user locations, years of birth, and relationship labels. And this data is already being sold on the dark web.

How can big companies keep their user’s data safe and avoid potential data breaches?

  1. Set multiple layers of security
  2. Learn from high-profile data breaches such as 23andMe and LastPass
  3. Manage security posture with enterprise-grade solutions that can support your growing infrastructure

Cloud Data Security Posture Management (DSPM), for example,  is a security solution designed to prevent data breaches for companies that handle a large amount of sensitive information.

What Is DSPM?

Data Security Posture Management is a cloud-based cybersecurity solution designed to discover, classify, and manage access to important data.

Also, it detects vulnerabilities and threats that could lead to exploitation or escalate into hacking incidents such as data breaches.

For companies, DSPM:

  • Uncovers which data a business has
  • Classifies information based on the type
  • Finds vulnerabilities that might compromise data
  • Enforces compliance that follows industry standards

As a result, it keeps an eye on and manages the security and privacy of data across the complete IT architecture of a company.

Discover and Classify Data

The first step of the DSPM data protection process is to find out which data is stored within the system. It continually learns which data the company has to monitor and who is accessing this data later.

Once it knows which data is there, it classifies it based on the type — to pinpoint sensitive data.

As a result, security teams have complete visibility of which data is within the system and who has access to it. They get a clear image of what needs to be protected from hackers looking to steal data.

The process of mapping and discovery is ongoing and continual. 

This is essential for large businesses that enrich their databases with new data, change it, and move from one part of the infrastructure to the next every day. 23andMe fits that profile.

Access Control Management

In October, 23andMe disclosed that the hacking was possible because users reused weak passwords. Threat actors relied on brute force attacks (specifically credential stuffing) since they had user passwords from other breaches.

Once they guessed the correct login, the hacker would access not only that user’s information but also the data of all its relatives with whom the user matched on the site.

How do you uncover the hacking activity once the bad actor is in?

Access management is one of the core capabilities of DSPM. It enforces stricter controls and makes sure that the user who is logging in is genuine. 

It enforces the best access practices — from making sure that the users use 2-factor authentication to using machine learning to finding anomalies within the infrastructure of a business.

For instance, it can enforce the zero trust model that assumes every person attempting to log in could be a cyber criminal — even if they have the right credentials.

23andMe did have 2-factor authentication, but it made this step obligatory for all users only after the breach.

Ensure Compliance

A class action lawsuit has already been filed because the hacker shared the data on hacking forums in October.

Although not all users are concerned about data privacy, thousands of users already contacted the Canadian law firm that prepared the case and asked to join the fight.

The firm claims that 23andMe didn’t adhere to proper data privacy practices and, with it, put the sensitive data of Canadian citizens at risk.

How could DSPM help?

DSPM aids big enterprises that store large volumes of data to enforce regulatory compliance across the entire infrastructure. They make sure it follows the best cybersecurity and privacy practices.

The types of compliance or the best cybersecurity practices a business needs to meet will depend on the industry. In the case of 23andMe, we’re talking about a company that holds a lot of sensitive data.

The company’s official site states that they follow the GDPR — data privacy for EU users. It’s not yet clear if they followed the prescribed practices of other relevant regulatory laws.

Data Security Fit for Enterprises

After a data breach occurs, the most a company can do is try to reduce the reputational and financial damage. The data is already out in the world — in most cases, available on hacking forums.

So how can you mitigate damage when cybercriminals have already compromised a company?

Rebuild the trust by offering free identity protection services if the sensitive data has been leaked.

Trust is difficult to rebuild, especially for companies such as 23nadMe that claim, “At 23andMe, Privacy is in our DNA.” Big promises have to be backed up with good security practices.

How a company handles a data breach is also important. 23andMe took some time until they began notifying affected users.

Data security is different for smaller companies vs those that have complex infrastructure, millions of users, and databases filled to the brim with personally identifiable information.

The truth is — both cybersecurity and data privacy are more complex and challenging at scale.

Therefore, larger enterprises that handle sensitive information require more robust security and tools that can continually monitor the entire architecture, such as DSPM.

Cyber Writes

Work done by a Team Of Security Experts from Cyber Writes (www.cyberwrites.com) - World’s First Dedicated Content-as-a-Service (CaaS) Platform for Cybersecurity. For Exclusive Cyber Security Contents, Reach at: business@cyberwrites.com

Recent Posts

Nearest Neighbor Attacks: Russian APT Hack The Target By Exploiting Nearby Wi-Fi Networks

Recent research has revealed that a Russian advanced persistent threat (APT) group, tracked as "GruesomeLarch"…

1 day ago

240+ Domains Used By PhaaS Platform ONNX Seized by Microsoft

Microsoft's Digital Crimes Unit (DCU) has disrupted a significant phishing-as-a-service (PhaaS) operation run by Egypt-based…

2 days ago

Russian TAG-110 Hacked 60+ Users With HTML Loaded & Python Backdoor

The Russian threat group TAG-110, linked to BlueDelta (APT28), is actively targeting organizations in Central…

2 days ago

Earth Kasha Upgraded Their Arsenal With New Tactics To Attack Organizations

Earth Kasha, a threat actor linked to APT10, has expanded its targeting scope to India,…

2 days ago

Raspberry Robin Employs TOR Network For C2 Servers Communication

Raspberry Robin, a stealthy malware discovered in 2021, leverages advanced obfuscation techniques to evade detection…

2 days ago

145,000 ICS Systems, Thousands of HMIs Exposed to Cyber Attacks

Critical infrastructure, the lifeblood of modern society, is under increasing threat as a new report…

2 days ago